Jump to content

Ineffective_Device

Members
  • Posts

    2
  • Joined

  • Last visited

Posts posted by Ineffective_Device

  1. Surely spoofing is of little use as the main purpose of spoofing is man in the middle attacks, which are not effective if the device has no mechanism to deal with HTTPS.

    While auditing and recon are present in the device, there seems to be nothing present that a simple ping sweep or network scan could not accomplish.

    I work in penetration testing and vulnerability assessment and later today will be giving a demo and talk on the pineapple where I will find it very hard not to describe it as a piece of hardware that is aging and on the verge of being completely obsolete.

×
×
  • Create New...